SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.
Despite much hype, offensive cyber capabilities have had a relatively minor role in recent wars and have thus far provided very few strategic effects to the war effort - either in Ukraine, Middle East or other conflicts around the world. How might that change in a future war? Dmitri Alperovitch, will provide a detailed exploration of scenarios of integration of cyber and kinetic effects in future conflicts.
Several attacks are explicitly targeting developers. In this presentation, you will learn how developers are exposed to these attacks and why it is difficult to recognize and prevent them.
In an era where data breaches and privacy concerns are increasingly prevalent, safeguarding personal and organizational information has become paramount.
In this talk, we’ll explore how GitHub secures its cloud infrastructure, focusing on protecting the critical resources developers rely on. We’ll dive into the history, evolution, and future of GitHub’s security approach, highlighting the strategies that safeguard the platform powering the world’s software development.
Microsoft provides users with the convenience of single-sign-on (SSO) solutions. But the authorisation credentials upon which SSO relies have long been targeted by attackers. Pass-the-hash, pass-the-ticket, pass-the-token, and other attacks allow attackers to move freely about your network, even between your on-prem and cloud environments. Learn more about these attacks and the latest controls to mitigate their associated risk.
A mysterious USB stick has been found in a car park, and it’s up to you to uncover the secrets it holds. Over two nights, participants will dive into the fundamentals of digital forensics, following a step-by-step guided investigation.
A mysterious USB stick has been found in a car park, and it’s up to you to uncover the secrets it holds. Over two nights, participants will dive into the fundamentals of digital forensics, following a step-by-step guided investigation.
This talk will look at how attackers are actually making use of artificial intelligence to attack organizations through social engineering attacks, and what organizations can do to try and actually address these threats.
This essential webcast blends expert presentation, an in-depth interview, and a live Q&A session. Attendees will walk away with clear, actionable guidance to help their organisations meet DORA and NIS2 compliance requirements—insight you can apply immediately.
Secure the Future: Practical Solutions for Tomorrow’s Cyber ThreatsJoin us for the Emerging Threats Summit Solutions Track for a unique, forward-looking virtual event focused not just on identifying emerging cybersecurity threats—but on tackling them head-on.Rather than speculating, we’ve invited leading experts who are actively shaping the future of cybersecurity to share real-world insights and actionable strategies. From AI and ICS/OT vulnerabilities to the implications of quantum computing, this event is designed to equip you with proactive, solution-driven approaches to stay ahead of the evolving threat landscape.You’ll gain access to:Expert-Led Sessions exploring high-impact threat areas and what they mean for your organization.Interactive Discussions focused on building practical frameworks, advancing workforce education, and shaping policy and regulation.Collaborative Insights that connect research with real-world application so you can act, not react.If you're responsible for securing systems, developing strategies, or building resilience into your organization, this summit is your opportunity to future-proof your defenses—before tomorrow’s threats become today’s realities.Reserve your spot and help shape the response to cybersecurity’s next big challenges.
SEC530 with its focus on defensive security engineering and architecture is designed to help students establish and maintain a holistic and layered approach to security, while taking them on a journey towards a realistic 'less trust' implementation based on Zero Trust principles, pillars and capabilities. This webcast will go over some key points from each day of the course and demonstrate how the lab exercises function.